For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That’s one of the reasons executives often discover security breaches when an external researcher — or worse, a journalist — gets in touch to ask why hundreds of ...

In the late 1990's Tom Standage released the first edition of a book that would sweep across the tech community because of its incredible analogies to the rise of the Internet hitting the world at that time. The "Victorian Internet", first released in 1998, was updated and re-released ...

Shivon Zilis is an investor at Bloomberg Beta, a very interesting early stage venture capital fund. I knew I would like Bloomberg Beta when I saw how they do their website. It is smart and reflects very well on their leadership team: They decided to leverage GitHub for their site. Doin...

The cloud has evolved quickly. Businesses have weighed the perks of private, public, and even hybrid clouds. If those options weren’t enough, here comes the open hybrid cloud.
An open hybrid cloud leverages the benefits of accessing data and processes across private and public impleme...

Over the past few years, there has been an explosion in the volume of data. To tackle this big data explosion, there has been a rise in the number of successful Hadoop projects in enterprises. Due to the large volumes of data, the emergence of Hadoop technology, and the need to store a...

Today, we’re going to talk about the Internet of Things and Big Data.
Bear with me here. This isn’t going to be some vague, half-cocked article bogged down by buzzwords and vagaries. Instead, what we’re going to do is take a close look at both technologies - what they actually are and...

Big Data is the revolution the business world has been waiting for. The transformation that has taken place among many companies due to the adoption of Big Data analytics simply can’t be understated. Organizations of all types have looked into the many ways in which big data can help t...

The processes for IT, facilities and human resources (HR) are broadly similar and do overlap, such as with commencement and exit procedures, and can easily be brought together in a single tool to manage. However, even when doing so and when supporting departments have their own tools a...

The O’Reilly Solid Conference The O’Reilly Solid Conference is returning to San Francisco’s waterfront June 23-25. Solid is unique: a mash-up of MIT and Disneyland for the IoT that combines deep, intelligent conversations about vital issues like security, business models, and standard...

Who needs to go out for dinner, when you have a tireless master chef waiting at home to prepare a gourmet meal for you, any time, day or night? That's the premise behind a new invention from Moley Robotics, a tech company based in London. Moley unveiled their new "robochef" prototype...

The many analysts who participated as part of the GigaOm cadre of contributors are in a strange limbo. Many have not been paid for recent work with GigaOm, meaning they too are creditors, just not ones with very much legal standing.
So far there has been no insights reported on the ...

The Android Wear app that Hyundai demonstrated at CES several weeks ago is now available on Google Play, letting owners of appropriately-equipped models control their cars from their wrists.
The app is basically a scaled-down version of the Blue Link app already available for Androi...

Editor’s note: This post by Invincea CEO Anup Ghosh first appeared at LinkedIn. We knew this would be of interest to you and posted it here with the author’s permission.-bg I’ll say it up front, your security program does not work because it is based on three common m...

American interest in online privacy and surveillance programs has jumped since Edward Snowden’s revelations about digital government surveillance in the United States. Deteriorating public relations have plagued intelligence agencies that have been identified as participating in the ma...

On August 28th, Samsung and LG announced their latest generation of smartwatches in separate press releases. The Samsung report flaunts its Gear S, a smartwatch with a curved screen that measures a full two-inches long. Capabilities of the watch include providing notifications from soc...

Google has created what it calls a “Matrix-style,” virtual version of California’s road system that it’s been using to test self-driving cars before sending them out onto the actual road, according to the Guardian. Google is apparently so thrilled with its simulation that it asked Cali...

As enterprises work to rapidly embrace the mobile revolution, both for their workforce and to engage more deeply with their customers, the pressure is on for IT to support the tools needed by their application developers. Mobile application developers are working with a massive variety...

Think of a cloud provider. I’d bet that for the majority of people reading this article, the first that comes to mind is AWS. Amazon Web Services were a trailblazer in the cloud space, and they still lead adoption rates at all levels of the market, from SMBs to multinationals. In some ...

With the herald of innovative, personal, smart and targeted marketing, ‘big data’ offers enticing and varied advantages for businesses.
The ability uncover and harness data, to tackle and tame the informational chaos presented, is increasingly expected of most organisations. But how...

“Global spending on big data by organizations will exceed $31 billion in 2013, finds a new market forecast by ABI Research. The spending will grow at a CAGR of 29.6% over the next five years, reaching $114 billion in 2018. The forecast includes the money spent on internal salaries, pro...

Enterprise technologists have been wrestling with a common challenge for years. Just like Vannever Bush described in 1945, the amount of data being created is growing faster than humans can analyze. We all seem more motivated to address this challenge, especially since fast fast analys...

Today, IT requirements are changing. IT trends are moving towards centralized processing, exploding stores of data and always-on always available services. Economic realities in the federal space are driving new approaches even faster now, since centralized processing and services mak...

Peter Schlampp, the Vice President of Products and Business Development at Platfora, explains what the Hadoop Big Data reservoir is and is not in this webinar that I watched today. Knowing what the HDR is and is not is key to pulling out business intelligence insights and analytics. Pl...

When talking with the less-technical people in your enterprise, which may include end users and many others on the leadership team, it always pays to have non technical expressions to describe new capabilities. Here are some thoughts on Platfora that may be of use in discussions like t...

By Bob GourleyYou don’t have to convince government IT leaders of the smart new business models, efficiencies and performance enhancements available with cloud computing. Like IT professionals everywhere, federal technologists get it. But things are different in the federal commu...

There are several certainties in computer security. One is that when adversaries have intent they will always find a way to get what they want. Another certainty is that leadership in government and industry is quick to forget the lessons learned in cyber security, especially those dea...

By MollyJust With this post we provide insights into three key healthcare trends to watch: 1. Impending Meaningful Use Stage 2 Deadline The federal government introduced requirements for “meaningful use” attestation in the use of electronic health care records. Rules are r...

Here is the top tech news and stories for Tuesday (sorry about the delay). Firefox for Tablets updated with speed and power - one of the top mobile browsers is Firefox. Their latest update mirrors the most recent smartphone update. Unlike many mobile browsers, Firefox supports Flash. V...

Do you remember service-oriented architecture (SOA)? This concept led to tremendous new capabilities and efficient, mission-focused designs. Enterprises established architectures in which application interfaces, logic and data were separated and smartly reusable. After the term went ma...

Big Data is the data too large, complex, and fast-moving for conventional information infrastructure to handle. There’s been a lot of buzz about investment in cutting edge Big Data solutions and start ups, and for good reason. Venture capital for Big Data is sizable and growing.

Researchers Show How to Crack Android Encryption – Thomas Cannon and Seyton Bradford have successfully shown brute force attacks against Android encryption at DEFCON. Because Android encryption is based on the Linux dm-crypt, it is easily broken on either Android 3.x or 4.x devi...

Here are today’s top tech news stories. Bitcoin, the underground currency of the Internet, is experiencing speculative growth - there have been a few things pushing up the value of the Bitcoin, including a drug purchasing version of eBay. There are now “High Yield Investmen...

In the emerging multi-tenant cloud, the old rules of vendor lock-in are rapidly changing. A network virtualization platform must be able to operate on top of any network hardware, much like x86 server hypervisors work on top of any server. This independence means the physical network c...

Network Virtualization represents the most significant innovation in networking since the inventions of Ethernet and the multi-protocol router, two technologies pioneered to level the playing field for device connectivity. Network Virtualization is an emerging technology that will pro...

Cleversafe provides dispersed storage solutions that give infinite scale and cost-effective data storage/protection/access. Apache Hadoop and the CDH4 distribution provides all the required software for implementing MapReduce and the other chores associated with analysis over massive q...

At AT&T Labs in Florham Park, New Jersey, big data is being used to analyze the traffic and movement patterns of people through data generated by their mobile phones to help improve policymaking and urban and traffic planning. The research team realized they could understand deep patte...

The greatest source of potential use cases for technology is the user community. This is a great reason to attend events where customers are at the center of focus. This was what last month’s Splunk Live DC was like. Splunk is a very user-focused capability and when you create a ...

Here is today’s federal cybersecurity and information technology news: IBM and the Lawrence Livermore National Laboratory are working together on the Vulcan supercomputer to analyze data for developing new technologies in applied energy, green energy, manufacturing, data manageme...

We recently wrote about TechAmerica and their activities related to Big Data in the Public Sector. A Big Data Task Force in TechAmerica’s public sector group has kicked off a collaborative activity in a Big Data Task Force.
There has been a new development in domain. The foundation a...